Multi-level trust-based intelligence schema for securing of internet of things (IoT) against security threats using cryptographic authentication

The internet of things (IoT) is able to provide a prediction of linked, universal, and smart nodes that have autonomous interaction when they present services. Because of wide openness, relatively high processing power, and wide distribution of IoT things, they are ideal for attacks of the gray hole. In the gray hole attack, the attacker fakes itself as the shortest path to the destination that is a thing here. This causes the routing packets not to reach the destination. The proposed method is based on the AODV routing protocol and is presented under the MTISS-IoT name which means for the reduction of gray hole attacks using check node information. In this paper, a hybrid approach is proposed based on cryptographic authentication. The proposed approach consists of four phases, such as the verifying node trust in the IoT, testing the routes, gray hole attack discovery, and the malicious attack elimination process in MTISS-IoT. The method is evaluated here via extensive simulations carried out in the NS-3 environment. The experimental results of four scenarios demonstrated that the MTISS-IoT method can achieve a false positive rate of 14.104%, a false negative rate of 17.49%, and a detection rate of 94.5% when gray hole attack was launched.

[1]  AirehrourDavid,et al.  Secure routing for internet of things , 2016 .

[2]  Shahram Jamali,et al.  Defending against Wormhole Attack in MANET Using an Artificial Immune System , 2016 .

[3]  Reza Fotohi,et al.  Securing Wireless Sensor Networks Against Denial‐of‐Sleep Attacks Using RSA Cryptography Algorithm and Interlock Protocol , 2019, Int. J. Commun. Syst..

[4]  Reza Fotohi,et al.  Securing of Unmanned Aerial Systems (UAS) against security threats using human immune system , 2020, Reliab. Eng. Syst. Saf..

[5]  Sanjay Kumar Dhurandher,et al.  An Asymmetric RSA-Based Security Approach for Opportunistic IoT , 2018, WIDECOM.

[6]  Jiong Jin,et al.  Cyber security framework for Internet of Things-based Energy Internet , 2018, Future Gener. Comput. Syst..

[7]  Shahram Jamali,et al.  A Comprehensive Study on Defence Against Wormhole Attack Methods in Mobile Ad hoc Networks , 2014 .

[8]  Chung-Horng Lung,et al.  Routing Attacks and Mitigation Methods for RPL-Based Internet of Things , 2019, IEEE Communications Surveys & Tutorials.

[9]  Tao Qin,et al.  IMLADS: Intelligent Maintenance and Lightweight Anomaly Detection System for Internet of Things , 2019, Sensors.

[10]  Dan Deng,et al.  Intelligent Secure Communication for Internet of Things With Statistical Channel State Information of Attacker , 2019, IEEE Access.

[11]  Shahram Behzad,et al.  An Artificial Immune Based Approach for Detection and Isolation Misbehavior Attacks in Wireless Networks , 2018, J. Comput..

[12]  Ioannis Papaefstathiou,et al.  SCOTRES: Secure Routing for IoT and CPS , 2017, IEEE Internet of Things Journal.

[13]  Jamali Shahram,et al.  A Hybrid Routing Method for Mobile ad-hoc Networks , 2016 .

[14]  Devesh C. Jinwala,et al.  Blackhole Detection in 6LoWPAN Based Internet of Things: An Anomaly Based Approach , 2019, TENCON 2019 - 2019 IEEE Region 10 Conference (TENCON).

[15]  Furkan Yusuf Yavuz,et al.  Deep Learning for Detection of Routing Attacks in the Internet of Things , 2018, Int. J. Comput. Intell. Syst..

[16]  Isaac Woungang,et al.  T_CAFE: A Trust based Security approach for Opportunistic IoT , 2019, IET Commun..

[17]  N. Bhalaji,et al.  A Trust Based Mechanism to Combat Blackhole Attack in RPL Protocol , 2019, ICICCT - 2019.

[18]  Sayan Kumar Ray,et al.  A trust-aware RPL routing protocol to detect blackhole and selective forwarding attacks , 2017 .

[19]  Ashutosh Sharma,et al.  A Secure Communicating Things Network Framework for Industrial IoT using Blockchain Technology , 2019, Ad Hoc Networks.

[20]  Reza Fotohi,et al.  An Efficient Routing Protocol in Mobile Ad-hoc Networks by using Artificial Immune System , 2020, ArXiv.

[21]  Daniele Miorandi,et al.  REATO: REActing TO Denial of Service attacks in the Internet of Things , 2018, Comput. Networks.

[22]  Shahram Behzad,et al.  Defense Against the Attacks of the Black Hole , Gray Hole and Wormhole in MANETs Based on RTT and PFT , 2015 .

[23]  Tricha Anjali,et al.  Gray Hole Attack as a Byzantine Attack in a Wireless Multi-Hop Network , 2020, Journal of Applied Security Research.

[24]  Roger Woods,et al.  Physical Layer Security for the Internet of Things: Authentication and Key Generation , 2019, IEEE Wireless Communications.

[25]  Mansour Sheikhan,et al.  Hybrid of anomaly-based and specification-based IDS for Internet of Things using unsupervised OPF based on MapReduce approach , 2017, Comput. Commun..

[26]  Shahram Jamali,et al.  An Improvement over AODV Routing Protocol by Limiting Visited Hop Count , 2013 .

[27]  Reza Fotohi,et al.  A New Approach for Improvement Security against DoS Attacks in Vehicular Ad-hoc Network , 2020, International Journal of Advanced Computer Science and Applications.

[28]  Sayan Kumar Ray,et al.  Secure routing for internet of things: A survey , 2016, J. Netw. Comput. Appl..

[29]  Reza Fotohi,et al.  An Artificial Immune System based Method for Defense against Wormhole Attack in Mobile Adhoc Networks , 2018 .

[30]  Houbing Song,et al.  Security of the Internet of Things: Vulnerabilities, Attacks, and Countermeasures , 2019, IEEE Communications Surveys & Tutorials.

[31]  Wenyuan Xu,et al.  Cuckoo-RPL: Cuckoo Filter based RPL for Defending AMI Network from Blackhole Attacks , 2019, 2019 Chinese Control Conference (CCC).

[32]  Shahram Jamali,et al.  DAWA: Defending against wormhole attack in MANETs by using fuzzy logic and artificial immune system , 2017, The Journal of Supercomputing.

[33]  Shahram Jamali,et al.  Improvement over the OLSR Routing Protocol in Mobile Ad Hoc Networks by Eliminating the Unnecessary Loops , 2013 .

[34]  Cristina Alcaraz Security and Privacy Trends in the Industrial Internet of Things , 2019, Advanced Sciences and Technologies for Security Applications.

[35]  Mauro Conti,et al.  SPLIT: A Secure and Scalable RPL routing protocol for Internet of Things , 2018, 2018 14th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob).

[36]  G. Geethakumari,et al.  Exponential Smoothing based Approach for Detection of Blackhole Attacks in IoT , 2018, 2018 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS).